Abstract
Peer-to-Peer (P2P) networks is a distributed structure, which is widely used in file sharing, distributed computing, deep search engines. Each node plays the dual role of client and server, which makes the P2P network further exacerbates the insecurity of P2P systems. For the behavior of nodes in P2P systems, requesting nodes are abstracted into customers and service nodes are abstracted into servers. An M/M/c queueing model is developed with dynamically changing servers in almost unobservable cases, strategies are introduced, including start-up period, working sleep of service nodes and negative customers, etc. Using the matrix-geometric solution and Gauss-Seidel iteration method, average waiting length, average sojourn time, total energy consumption and throughput are derived. Through numerical experiments, the process of P2P file sharing is simulated, the optimal value of social utility is obtained using Nash equilibrium and social optimal strategy, and a theoretical basis is provided for node scheduling in P2P systems.







Similar content being viewed by others
Data availability
In this work, the queuing theory is applied into the P2P networks model, When a large number of nodes connect to the server route to request for the required data resources, the requesting nodes will form a queue in the system, in order to avoid congestion of request queue, a three-dimensional Markov chain with working sleep of service nodes and negative customers, etc. constructed. The social optimization and the arrival rate of request note through a reasonable charging scheme are obtained. The data used to support the findings of this study are included within the article.
References
Qiu, D., Srikant, R.: Modeling and performance analysis of BitTorrent-like Peer-to-Peer networks. ACM 34, 167–178 (2004)
Yang, X., Veciana, G.: Performance of Peer-to-Peer networks: service capacity and role of resource sharing policies. Perform. Eval. 63(3), 175–194 (2006)
Silva, S.E., Leão, R.M.M., Menasché, D.S., Towsley, D.: On the scalability of P2P swarming systems. Comput. Netw. 151, 93–113 (2019)
Shi, X.N., Jiang, N.: A file sharing system based on hybrid hierarchical P2P network. China Comput. Commun. 32(21), 162–165 (2021). (in Chinese)
Bok, K., Kim, J., Yoo, J.: Cooperative caching for multimedia data in mobile P2P networks. Multimed. Tools Appl. 78(5), 5193–5216 (2017)
Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., Abdelhag, M.: Mobile cloud computing: challenges and future research directions. In: International Conference on Developments in eSystems Engineering, IEEE. 62–67 (2017)
Al-Janabi, S., Hussein, N.Y.: The reality and future of the secure mobile cloud computing (SMCC): survey. In: Big Data and Networks Technologies. Springer, Cham (2020)
Al-Janabi, S., Patel, A., Fatlawi, H., Kalajdzic, K., Al Shourbaji, I. : Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: 2014 International Congress on Technology, Communication and Knowledge (ICTCK), Mashhad, Iran, pp. 1–8, (2014)
Zheng, X.J., Li, T.: Pre-switching: research on P2P shared file backup technology. Softw. Guide 20(4), 205–210 (2021). (in Chinese)
Premakumari, T., Chandrasekaran, M.: Soft computing approach based malicious peers detection using geometric and trust features in P2P networks. Clust. Comput. 22(17), 2227–2232 (2018)
Al-Janabi, S., Mohammad, M., Al-Sultan, A.: A new method for prediction of air pollution based on intelligent computation. Soft Comput. 24(1), 661–680 (2019)
Al-Janabi, S., Alkaim, A.F., Adel, Z.: An Innovative synthesis of deep learning techniques (DCapsNet & DCOM) for generation electrical renewable energy from wind energy. Soft Comput. 24(14), 10943–10962 (2020)
Singh, S.K., Kumar, C., Nath, P.: Analysis and modelling the effects of mobility, churn rate, node’s life span, intermittent bandwidth and stabilization cost of finger table in structured mobile P2P networks. Wirel. Netw. 27, 1049–1062 (2021)
Marozzo, F., Talia, D., Trunfio, P.: A sleep-and-wake technique for reducing energy consumption in BitTorrent networks. Concurr. Comput. Pract. Exp. (2020). https://doi.org/10.1002/cpe.5723
Sun, S.Y., Yao, W.B., Li, X.Y.: SORD: a new strategy of online replica deduplication in Cloud-P2P. Clust. Comput. 22, 1–23 (2019)
Heyman, D.P., Lakshman, T.V., Neidhardt, A.L.: A new method for analyzing feedback-based protocols with applications to engineering web traffic over the Internet. Comput. Commun. 26(8), 785–803 (2003)
Singha, N., Singh, Y.N.: New incentive mechanism to enhance cooperation in wireless P2P networks. Peer-to-Peer Netw. Appl. 14(3), 1218–1228 (2021)
Liu, J.P., Jin, S.F., Wang, B.S.: Study on optimization strategy for hybrid underlay/overlay spectrum sharing based on queuing model. J. Commun. 38(9), 55–64 (2017). (in Chinese)
Fu, L.W., Jin, S.F.: Nash equilibrium and social optimization in cloud service systems with diverse users. Clust. Comput. 24(3), 2039–2050 (2021)
Li, S.Y., Liu, H., Li, W.Z., Sun, W.: An optimization framework for migrating and deploying multiclass enterprise applications into the Cloud. IEEE Trans. Serv. Comput. (2021). https://doi.org/10.1109/TSC.2022.3174216
Zhang, C.Z., Ma, Z.Y., Zhang, L.Y., Wang, S.Z.: Energy saving strategy and Nash equilibrium of hybrid P2P networks. J. Parallel Distrib. Comput. 157, 145–156 (2021)
Ge, Z., Figueiredo, D.R., Jaiswal, S., Kurose, J., Towsley, D.: Modeling peer-peer file sharing systems. IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), San Francisco, USA (2003)
Wang, J.T., Wang, Z.B., Liu, Y.N.: Reducing delay in retrial queues by simultaneously differentiating service and retrial rates. Oper. Res. 68(6), 1648–1667 (2020)
Dudin, A.N., Dudina, S.A., Dudina, O.S., Samouylov, K.E.: Competitive queueing systems with comparative rating dependent arrivals. Oper. Res. Perspect. 7, 100139 (2020)
Xu, Z.R., Zhu, Y.J., Luo, H.J.: Working vacation queue with closed-down, set-up period and negative customers. J. Jiangsu Univ. (Nat. Sci. Ed.) 33(2), 244–248 (2012). (in Chinese)
Panda, G., Goswami, V.: Equilibrium joining strategies of positive customers in a Markovian queue with negative arrivals and working vacations. Methodol. Comput. Appl. Probab. (2021). https://doi.org/10.1007/s11009-021-09864-8
Ma, Z.Y., Cao, J., Yu, X.R., Guo, S.S.: Multiple vacation queuing system with impatient customers and work failure. J. Chongqing Normal Univ. (Nat. Sci. Ed.) 36(4), 7–13 (2019). (in Chinese)
Wang, J.T.: Fundamentals of Queuing Game Theory. Science Press, Beijing (2016). (in Chinese)
Si, Q.N., Ma, Z.Y., Liu, F.J., Wang, R.: Performance analysis of P2P network with dynamic changes of servers based on M/M/c queuing model. Wirel. Netw. 27(5), 3287–3297 (2021). https://doi.org/10.1007/s11276-021-02659-2
Tian, N.S., Yue, D.Q.: The Quasi Birth and Death Process and Matrix-Geometric Solution. Science Press, Beijing (2002). (in Chinese)
Neuts, M.F.: Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach. Johns Hopkins University Press, Baltimore (1981)
Funding
This work was financially supported in part the National Natural Science Foundation of China under Grant Nos. 61973261, 61872311 and Natural Science Foundation of Hebei Province under Grant No. A2020203010 and Project of Hebei Key Laboratory of Software Engineering, No. 22567637H.
Author information
Authors and Affiliations
Contributions
During the writing and revision of the paper, every author had made important and irreplaceable contributions. First Author performed method guidance and process supervision. Second Author performed model building, programming and numerical experiments, etc. Third Author and Fourth Author performed literature search, graphic beautification and error checking, etc.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
All the authors listed have approved the manuscript that is enclosed, and no conflict of interest exits in the submission of this manuscript.
Informed consent
I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part. I hope this paper is suitable for “Cluster Computing”
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ma, Z., Si, Q., Liu, Y. et al. Performance analysis of P2P networks with malicious nodes. Cluster Comput 25, 4325–4337 (2022). https://doi.org/10.1007/s10586-022-03683-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03683-3